Skip to content

Commit 4ea181b

Browse files
committed
commit main
2 parents 0b5fe8a + 10c59dc commit 4ea181b

File tree

547 files changed

+31497
-28133
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

547 files changed

+31497
-28133
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-debugger-troubleshoot.md",
5-
"redirect_url": "https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/snapshot-debugger-troubleshoot",
6-
"redirect_document_id": false
7-
},
8-
{
3+
{
94
"source_path_from_root": "/articles/azure-monitor/best-practices.md",
105
"redirect_url": "/azure/azure-monitor/getting-started",
116
"redirect_document_id": false

.openpublishing.redirection.deployment-environments.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@
1414
"source_path_from_root": "/articles/deployment-environments/tutorial-create-and-configure-projects.md",
1515
"redirect_url": "/azure/deployment-environments/quickstart-create-and-configure-projects",
1616
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/deployment-environments/how-to-configure-use-cli.md",
20+
"redirect_url": "https://aka.ms/CLI-reference",
21+
"redirect_document_id": false
1722
}
1823
]
1924
}

.openpublishing.redirection.dev-box.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path_from_root": "/articles/dev-box/quickstart-configure-dev-box-project.md",
1010
"redirect_url": "/azure/dev-box/quickstart-configure-dev-box-service",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/dev-box/cli-reference-subset.md",
15+
"redirect_url": "https://aka.ms/CLI-reference",
16+
"redirect_document_id": false
1217
}
1318
]
1419
}

.openpublishing.redirection.json

Lines changed: 22461 additions & 22450 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 17 additions & 17 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.custom: template-tutorial
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,27 +19,13 @@ ms.collection: M365-identity-device-management
1919

2020
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
2121

22-
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
24-
25-
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
26-
27-
> [!div class="nextstepaction"]
28-
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2922

3023
![My Account showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defaults-registered.png)
3124

3225
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
3326

3427
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
3528

36-
> [!IMPORTANT]
37-
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).
38-
>
39-
> You can set **Require users to register when signing in** to **Yes** to require all users to register when signing in, ensuring that all users are protected.
40-
>
41-
> You might encounter an error message while trying to access the Security info option, such as, "Sorry, we can't sign you in". Confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
42-
4329
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
4430

4531
If you want to force a specific language, you can add `?lng=<language>` to the end of the URL, where `<language>` is the code of the language you want to render.
@@ -131,6 +117,10 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
131117

132118
## Key usage scenarios
133119

120+
### Protect Security info registration with Conditional Access
121+
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding. Learn more on how to configure [common Conditional Access policies for securing security info registration.](../conditional-access/howto-conditional-access-policy-registration.md)
122+
123+
134124
### Set up security info during sign-in
135125

136126
An admin has enforced registration.

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ The two-gate policy requires two pieces of authentication data, such as an email
9696
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
9797
* Azure AD Connect is synchronizing identities from your on-premises directory
9898

99-
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators. Policy changes to disable or enable SSPR for administrator accounts can take up to 60 minutes to take effect.
99+
You can disable the use of SSPR for administrator accounts using the [Update-MgPolicyAuthorizationPolicy](/powershell/module/microsoft.graph.identity.signins/update-mgpolicyauthorizationpolicy) PowerShell cmdlet. The `-AllowedToUseSspr:$true|$false ` parameter enables/disables SSPR for administrators. Policy changes to enable or disable SSPR for administrator accounts can take up to 60 minutes to take effect.
100100

101101
### Exceptions
102102

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 13 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/16/2023
7+
ms.date: 03/20/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -94,25 +94,17 @@ Content-Type: application/json
9494

9595
### How does system-preferred MFA determine the most secure method?
9696

97-
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge.
98-
99-
1. Temporary Access Pass
100-
1. Certificate-based authentication
101-
1. FIDO2 security key
102-
1. Microsoft Authenticator notification
103-
1. Companion app notification
104-
1. Microsoft Authenticator time-based one-time password (TOTP)
105-
1. Companion app TOTP
106-
1. Hardware token based TOTP
107-
1. Software token based TOTP
108-
1. SMS over mobile
109-
1. OnewayVoiceMobileOTP
110-
1. OnewayVoiceAlternateMobileOTP
111-
1. OnewayVoiceOfficeOTP
112-
1. TwowayVoiceMobile
113-
1. TwowayVoiceAlternateMobile
114-
1. TwowayVoiceOffice
115-
1. TwowaySMSOverMobile
97+
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge. Click the link for information about each method.
98+
99+
1. [Temporary Access Pass](howto-authentication-temporary-access-pass.md)
100+
1. [Certificate-based authentication](concept-certificate-based-authentication.md)
101+
1. [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
102+
1. [Time-based one-time password (TOTP)](concept-authentication-oath-tokens.md)<sup>1</sup>
103+
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104+
105+
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106+
107+
<sup>2</sup> Includes SMS and voice calls.
116108

117109
### How does system-preferred MFA affect AD FS or NPS extension?
118110

@@ -121,6 +113,7 @@ System-preferred MFA doesn't affect users who sign in by using Active Directory
121113
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
122114

123115
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
116+
124117
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
125118

126119
## Next steps

0 commit comments

Comments
 (0)